How to Setup a Secure Home Office Network

The COVID-19 pandemic has greatly increased the number of people working from home, making home office networks routine rather than an exception. Home offices typically use a Wi-Fi network to connect wireless devices such as computers, phones, IP cameras, TVs and voice assistants to the internet. This type of network requires some basic steps to prevent a hacker from gaining …

India’s Data Privacy Law & What it Means to US Businesses

The IT Act, 2000 currently protects the personal data of India’s 1.4 billion people. Legislators have amended it multiple times since it was passed, but there is a growing consensus that this country needs specific legislation on personal data privacy.

4 Actions to Take After Upgrading to Windows 11

After upgrading to Windows 11, you probably will be excited and want to start using it right away. However, it is better to perform some checks and customizations. Here are four actions you might consider taking.

Email Account Hijacking Is on the Rise

Cybercriminals sent millions of malicious messages from compromised email accounts last year — and that number is expected to rise. Find out how cybercriminals take over email accounts and what businesses can do to protect them.

The New U.S. Data Security Law

President Joe Biden signed a bill into law on March 15, 2022 that provides funding for the Cyber Incident Reporting for Critical Infrastructure Act of 2021 (CIRCIA). This legislation is part of the Strengthening American Cybersecurity Act of 2022, which is intended to strengthen the federal government’s cybersecurity posture. The most immediate effect of CIRCIA is the requirement to report cybersecurity …

Beware of Vidar Spyware Masquerading within Microsoft

Security analysts have identified the Vidar malware as the payload in a phishing campaign that exploits Microsoft help files. Diana Lopera, researcher for Trustwave, announced on March 24, 2022 that the actors are concealing Vidar in Microsoft Compiled HTML Help (CHM) files to prevent anti-malware applications from detecting it.